HOW WE IMPLEMENT SECURITY FROM DESIGN THROUGH PRODUCTION

We go the extra mile to protect our supply chain and manufacturing processes. This way, our customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.

Counterfeit Parts Mitigation

The most important starting point for establishing a secure supply chain is ensuring the integrity of every part and component. That’s why we only buy components directly from franchise sources, from the components’ Original Equipment Manufacturer (OEM), or through the OEM’s authorized distribution channel.

We stay on top of new and evolving regulatory standards, implementing controlled processes designed to prevent counterfeit parts from entering the supply chain at any point in the product life cycle. Our SAE AS5553 (Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition) compliant process uses approved vendors who have been audited and monitored to ensure their authenticity and provide an audit trail for all components. We’re also compliant with SAE AS6174 (Counterfeit Materiel; Assuring Acquisition of Authentic and Conforming Materiel) standard, which now includes non-electrical component counterfeit mitigation.

Secure Manufacturing and Design Integrity

We provide robust mechanisms to protect our manufacturing facilities and mitigate any insider threats. Employees are subject to background checks before they are allowed to work on the manufacturing floor. Based on customer requirements, product is manufactured at sites accredited to handle ITAR information, and employees at these locations are ITAR cleared. As well, we have U.S. manufacturing sites that are secure facilities capable of handling classified data and components.

What’s more, to ensure design integrity throughout the product development process, Curtiss-Wright has facilities compliant to the U.S. DoD’s Risk Management Framework (RMF). This framework provides controls for the engineering environment to manage and mitigate unauthorized access, modification, loss, or theft of critical design information.

The Curtiss-Wright Advantage

Our technology solutions extend Trusted Computing best practices to every part of the development process, from design and testing to supply chain and manufacturing. The highest possible levels of protection are built into every aspect of solution development to increase the overall value that COTS solutions can provide in a secure system.

Curtiss-Wright takes a holistic view of Trusted Computing, going above and beyond the efforts of other vendors to apply the advanced protection capabilities needed to develop truly secure COTS solutions. It’s one of the main reasons the company has been a trusted, proven leader in the global defense and aerospace industries for decades.

Download our white paper to learn more about our supply chain, or explore our trusted, secure solutions below.

 


VPX3-1260

DTS1

Parvus DuraNET 3300 + CHAMP-XD1S

TrustedCOTS™ Processing Modules

Data-at-Rest Encryption & Secure Storage Solutions

All Trusted Computing Solutions

 

Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic